Affiliation:
1. Berhampur University, India
Abstract
Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity to sense actions, data movement, and communicate with each other. It is a self-governing network that consists of sensor nodes deployed in a particular environment, which has wide applications in various areas such as data gathering, military surveillance, transportation, medical system, agriculture, smart building, satellite communication, and healthcare. Wormhole attack is one of the serious attacks, which is smoothly resolved in networks but difficult to observe. There are various techniques used to detect the malicious node such as LITEWORP, SAM, DelPHI, GRPW, and WRHT. This chapter focuses on detection methods for wormhole attacks using trust-based systems in WSN.
Reference34 articles.
1. Hu, H., Chen, Y., Ku, W.S., & Su, Z. (2008). Malicious node detection in wireless sensor networks using weighted trust evaluation;I. M.,Atakli;Proceedings of the Symposium on Simulation of Systems Security
2. Bagchi & Shroff. (2005). LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multi hop Wireless Networks. Proceedings of the International Conference on Dependable Systems and Networks.
3. An architecture for intrusion detection using autonomous agents;J. S.Balasubramaniyan;ACSAC’98: Proceedings of the 14th Annual Computer Security Applications Conference
4. Bao, Chen, Chang, & Cho. (2012). Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. IEEE Transactions on Network and Service Management.
5. Trust-based security for wireless ad hoc and sensor networks
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献